frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Compiling Ruby to Machine Language

https://patshaughnessy.net/2025/11/17/compiling-ruby-to-machine-language
49•todsacerdoti•1h ago•1 comments

Show HN: I built a synth for my daughter

https://bitsnpieces.dev/posts/a-synth-for-my-daughter/
782•random_moonwalk•5d ago•148 comments

Show HN: PrinceJS – 19,200 req/s Bun framework in 2.8 kB (built by a 13yo)

https://princejs.vercel.app
52•lilprince1218•1h ago•20 comments

"One Student One Chip" Course Homepage

https://ysyx.oscc.cc/docs/en/
39•camel-cdr•5d ago•9 comments

My stages of learning to be a socially normal person

https://sashachapin.substack.com/p/my-six-stages-of-learning-to-be-a
165•eatitraw•2d ago•64 comments

Project Gemini

https://geminiprotocol.net/
147•andsoitis•5h ago•87 comments

FreeMDU: Open-source Miele appliance diagnostic tools

https://github.com/medusalix/FreeMDU
201•Medusalix•7h ago•49 comments

Show HN: ESPectre – Motion detection based on Wi-Fi spectre analysis

https://github.com/francescopace/espectre
52•francescopace•6h ago•7 comments

An official atlas of North Korea

https://www.cartographerstale.com/p/an-official-atlas-of-north-korea
123•speckx•3h ago•66 comments

WeatherNext 2: Our most advanced weather forecasting model

https://blog.google/technology/google-deepmind/weathernext-2/
128•meetpateltech•6h ago•50 comments

Israeli-founded app preloaded on Samsung phones is attracting controversy

https://www.sammobile.com/news/israeli-app-app-cloud-samsung-phones-controversy/
236•croes•4h ago•148 comments

Show HN: Continuous Claude – run Claude Code in a loop

https://github.com/AnandChowdhary/continuous-claude
29•anandchowdhary•2d ago•10 comments

Insects on the Space Menu

https://www.esa.int/Science_Exploration/Human_and_Robotic_Exploration/Insects_on_the_space_menu
5•ohjeez•5d ago•0 comments

Our dogs' diversity can be traced back to the Stone Age

https://www.bbc.com/news/articles/ce9d7j89ykro
19•1659447091•3d ago•6 comments

Aldous Huxley predicts Adderall and champions alternative therapies

https://angadh.com/inkhaven-7
22•surprisetalk•6h ago•6 comments

Astrophotographer snaps skydiver falling in front of the sun

https://www.iflscience.com/the-fall-of-icarus-you-have-never-seen-an-astrophotography-picture-lik...
123•doener•1d ago•27 comments

How to escape the Linux networking stack

https://blog.cloudflare.com/so-long-and-thanks-for-all-the-fish-how-to-escape-the-linux-networkin...
55•meysamazad•5h ago•5 comments

How when AWS was down, we were not

https://authress.io/knowledge-base/articles/2025/11/01/how-we-prevent-aws-downtime-impacts
45•mooreds•4h ago•23 comments

Giving C a superpower: custom header file (safe_c.h)

https://hwisnu.bearblog.dev/giving-c-a-superpower-custom-header-file-safe_ch/
215•mithcs•10h ago•172 comments

EEG-based neurofeedback in athletes and non-athletes

https://www.mdpi.com/2306-5354/12/11/1202
17•PaulHoule•3h ago•1 comments

A graph explorer of the Epstein emails

https://epstein-doc-explorer-1.onrender.com/
129•cratermoon•2d ago•16 comments

The time has finally come for geothermal energy

https://www.newyorker.com/magazine/2025/11/24/why-the-time-has-finally-come-for-geothermal-energy
60•riordan•7h ago•115 comments

Show HN: Building WebSocket in Apache Iggy with Io_uring and Completion Based IO

https://iggy.apache.org/blogs/2025/11/17/websocket-io-uring/
12•spetz•3h ago•2 comments

DESI's Dizzying Results

https://www.universetoday.com/articles/desis-dizzying-results
14•belter•3h ago•1 comments

Where do the children play?

https://unpublishablepapers.substack.com/p/where-do-the-children-play
254•casca•1d ago•199 comments

Google is killing the open web, part 2

https://wok.oblomov.eu/tecnologia/google-killing-open-web-2/
283•akagusu•5h ago•230 comments

Are you stuck in movie logic?

https://usefulfictions.substack.com/p/are-you-stuck-in-movie-logic
130•eatitraw•9h ago•117 comments

Replicate is joining Cloudflare

https://replicate.com/blog/replicate-cloudflare
239•bfirsh•7h ago•54 comments

People are using iPad OS features on their iPhones

https://idevicecentral.com/ios-customization/how-to-enable-ipad-features-like-multitasking-stage-...
96•K0IN•18h ago•109 comments

An overly aggressive mock can work fine, but break much later

https://nedbatchelder.com/blog/202511/why_your_mock_breaks_later.html
50•ingve•22h ago•51 comments
Open in hackernews

Azure hit by 15 Tbps DDoS attack using 500k IP addresses

https://techcommunity.microsoft.com/blog/azureinfrastructureblog/defending-the-cloud-azure-neutralized-a-record-breaking-15-tbps-ddos-attack/4470422
87•speckx•3h ago
https://www.bleepingcomputer.com/news/microsoft/microsoft-ai...

Comments

ChrisArchitect•2h ago
Source: https://techcommunity.microsoft.com/blog/azureinfrastructure...
dang•2h ago
Switched above. Thanks!
shoddydoordesk•1h ago
FWIW I think this is a bad practice.

The Microsoft article reads like a corporate press release. The original link contained additional pertinent information and research which is good for discussion.

TZubiri•2h ago
We should make residential proxies illegal
teeray•2h ago
...and suddenly no one is allowed to VPN back through their home router.
dongttebayo•2h ago
We really shouldn’t - this seems like perhaps one of the worst ideas one could propose in an era of rising authoritarian rule. Seems like a bad time to be putting silly restrictions on how folks route their traffic.
derwiki•1h ago
Tinfoil hat says it’s the gov’t doing it for those reasons /s
meowface•1h ago
I will disregard your cowardly "/s" and say: no, I bet it isn't.
TZubiri•1h ago
ok greenie
jeroenhd•1h ago
Making them illegal seems far-fetched, but at this point something like email blacklists but for web services is becoming inevitable.

At the moment, that's what Cloudflare is doing. They're just not obvious enough, leading to people on forums (and here) asking "why do I constantly need to fill out captchas to enter websites".

kachapopopow•1h ago
breaking the law by using wireguard to access my home network, hmm, great idea.
TZubiri•1h ago
Ok, I'll be a bit more specific, banning businesses and the trade of proxies that are purposefully marked as residential, in order to evade firewall blocks, and even to evade proxy blocks.

You gotta draw the line in the sand somewhere, VPNs are already morally dubious, but if you ban the most shady of VPNs, residential proxies, then you can at least guarantee service providers the right to deny service to proxy users, while allowing proxy users to use the proxy everwhere they are welcome in.

kachapopopow•3m ago
yah, but how else am I going to create millions of youtube accounts to spam sex bot ads >:(

on a serious note, it's just not really possible since most residential proxy sites are botnets :)

drcongo•2h ago
Imagine how much of that traffic was just the bots following the endless redirects.
siva7•2h ago
Those redirects would crash Azure, i'm betting a grand
dang•2h ago
Related. Others?

Cloudflare scrubs Aisuru botnet from top domains list - https://news.ycombinator.com/item?id=45857836 - Nov 2025 (34 comments)

Aisuru botnet shifts from DDoS to residential proxies - https://news.ycombinator.com/item?id=45741357 - Oct 2025 (59 comments)

DDoS Botnet Aisuru Blankets US ISPs in Record DDoS - https://news.ycombinator.com/item?id=45574393 - Oct 2025 (142 comments)

alpb•2h ago
Funny enough just got an error trying to reach to the blog

        Proxy Error
        The proxy server received an invalid response from an upstream server.
        The proxy server could not handle the request
        Reason: Error reading from remote server
bluedino•2h ago
IoT is just wave after wave of unsecure devices. There's gotta be a better way.
rdtsc•2h ago
The "S" in IoT stands for "security".
Razengan•1h ago
Internet of Thingsecurity?
heresie-dabord•1h ago
> There's gotta be a better way.

Until then... There's gonna be a bigger wave.

kachapopopow•1h ago
fun fact, part of the reason this botnet exists is because europe required the ability to install security updates unattended that you cannot disable and they compromised one of the servers that had the capability to push these updates compromising hundreds of thousands of routers.
Razengan•1h ago
Wait when was this?? Did it fly under the news??
cyberpunk•55m ago
That's really impressive finger pointing.

If the vendor can't even secure their update server; how long do you think it would be until some RCE on these 100k un-patchable routers gets exploited?

The only people to blame for this is the vendor, and they failed on multiple levels here. It's not hard to sign a firmware, or even just fetch checksums from a different site than you serve the files from...

esafak•2h ago
Is this Aisuru growing? How can it be dismantled?
SLWW•1h ago
Yes.

Only way is to secure your IoT devices/routers/cameras/etc.

esafak•1h ago
You mean through personal responsibility? That is not scalable; look at how many compromised devices there are. We need a better solution as an industry.
rollcat•1h ago
Yep. Manufacturers / distributors should be held responsible. Aligning the incentives is half the battle.
dainiusse•1h ago
/sarcasm Another ai crawler...
m00x•1h ago
Anthropic agent went a little haywire on the tool use
supportengineer•1h ago
I will never understand why there isn’t an international law enforcement agency with teeth, which can get rid of the bad actors.
trollbridge•1h ago
I mean, America can’t do anything about scam phone calls aimed at seniors who forge caller ID of local hospitals.
morkalork•1h ago
Can't or won't?
trollbridge•57m ago
I’ve decided there isn’t a difference.
lossyalgo•57m ago
As alluded to by morkalork, they definitely could if they wanted to, as the (most? of the) rest of the world doesn't seem to have this problem. As long as spammers keep paying telecoms & no law(s) forbidding this exist, it will continue.

edit: grammar

m00x•1h ago
How would you even enforce this if the offending country doesn't agree?
dijit•1h ago
Limit their upstream connection to the rest of the internet via allied countries.

Literally the same as economic sanctions. The internet is a network of peers “trading” bits and bytes after all.

m00x•1h ago
This won't do anything. The attacks are not from the offending countries they're from botnets of compromised devices.

North Korea doesn't care if you limit their internet they already allow people to go outside their own.

dijit•1h ago
perfect, then we just nullroute at source with Flowspec, even if we change the goalposts a thousand times in this thread there does exist a technical solution to this problem.

Just not enough economic or political incentive to pay for it.

immibis•1h ago
America already limits its upstream to China and Russia through a private companies such as Cloudflare and Spamhaus. It's often the case that for Chinese users seeking to escape censorship, once they've worked their way through the Chinese Great Firewall, they find themselves in front of the American one.
morkalork•1h ago
I'm sure you could come up with at least few ideas why it hasn't happened
Hikikomori•1h ago
America gonna allow someone else to regulate them?
Thaxll•1h ago
Because it's not technicaly possible, I mean we're on HN, we all know how internet works.
dijit•1h ago
You should talk to a network engineer before making claims like this. There are mechanisms to curtail DDOS attacks at origin.

For a few reasons (political, economical) there’s little will to enact them, these attacks are so few and far between and you can pay your way out of them in most cases, so the incentives aren’t there for ISPs (whom are a commodity judged primarily on price and bandwidth)

m00x•1h ago
How exactly would you keep the origin from sending a command to a botnet?
dijit•1h ago
you don’t stop the message to the botnet, thats impossible:

You detect the behaviour downstream and send a signal to the ISP that there is traffic that needs to he rate limited.

One mechanism for this is called RTBH (Remote Triggered BlackHole) which relies on community tagged prefixes of addresses exceeding rate limited to be blackholed from forwarding traffic further in to the internet.

There’s also things like flowspec but a lot of things rely on proper trust between ASNs.

Thaxll•25m ago
How do you know where it comes from, if they use UDP and change the src of the packets.
toast0•1m ago
The Microsoft blog suggests there was miminal source spoofing (although I don't knnow how they determine that). But if you can't trust the IP source, packet samples from your border router should indicate which upstream is sending those packets ... then you ask them to find the source... eventually you'll get somewhere ... but when the sources are distributed, it's not so helpful to find the source, unless there's a mechanism to stop the source from sending it.

When I was running servers that would routinely attract DDoSed at ~ 10 Gbps, I ended up always running a low sample rate packet capture. Anytime I noticed a DDoS, I could go and look at the packets. If you've got connectivity to sink and measure 15 Tbps of DDoS, you can probably influence your providers to take some sampled packet captures and look at them too.

Even without clear information from packet captures, 15 Tbps is going to make an impact on traffic graphs, and you can figure out sources from those, although it might be a bit tricky because the attack duration was reported at only 40 seconds, so if someone only has hourly stats, it might be too small to be noticed; but once a minute stats are pretty common.

SirMaster•1h ago
I heard it's a series of tubes.
Y_Y•1h ago
The international organisation for stopping wars, human trafficking, money laundering, drug distribution etc. however capable they might be, haven't managed to stamp out any of those things.

I'd say a putative UN NetWatch would suffer from the same issues of funding and corruption and politics, but still we might have something better than this wild west lawlessness.

halapro•1h ago
> have something better than this wild west lawlessness.

Careful what you wish for. Before you know it you can't have an IP without your ID.

immibis•1h ago
This is already the case in Germany and many other countries. Same for phone numbers. On the other hand, I get no spam calls, and I can't access the sites on https://cuiiliste.de/domains - censorship is amazing.
bak3y•1h ago
Yes, surely the German government telling it's people what to do has never gotten them in trouble in the past...
c0balt•1h ago
> putative UN NetWatch

But who will suppress attempts to go beyond the blackwall then?

sva_•1h ago
Since this is a distributed attack, I'm not really sure how that enforcement would look like? Am I missing something, are all these bots/zombies easily selectable and blockable?
toast0•1h ago
Investigative powers should be able to at least find and seize the command and control servers, and hopefully track down people operating the command and control servers.

Some sort of international clearing house for ISPs to help identify and sequester compromised customers might be nice, too; but that doesn't need law enforcement powers; and maybe it already exists?

poszlem•1h ago
Perhaps because, in many cases, the very governments responsible for enforcing it include the bad actors themselves.
Aurornis•1h ago
International DDoS busts and arrests do happen all the time.

Law enforcement takes time. The perpetrators of these attacks aren't hanging out in the open with their full names shielded only by the hope that their country won't extradite for political favor.

By the time the perpetrators are identified and a case is built, getting them charged isn't bottlenecked on the lack of an international agency. Any international law enforcement agency would be beholden to each country's own political wills and ideals, meaning any "teeth" they had would be no more effective than what we currenly have for extraditing people or cooperating with foreign police organizations.

kachapopopow•1h ago
the real reason why these are a problem in the first place is because of cgnat and transit providers not implementing flowspec.

but these bad actors are not possible to track down in the first place since internet is unfortunately decentralized and things as simple as transactions submitted to bitcoin or etherium blockchain can be used as c&c

zipy124•55m ago
Because countries benefit from conducting cyber warfare, the most publicised of are north Korea and Russia which have large state sponsored hacking groups.
mihaaly•44m ago
Legal systems are so convoluted and so colossally heterogenous - also very protective of their ways - around the globe that miniscule collaborations require grandiose efforts to initiate and maintain. No chance these fast paced adversaries will be caught by the interplay of several dozens of reluctant dinosaur legal systems.

Tangential: once I was targeted by a pretty primitive scam. More than 10 years ago (after someone I love was naive and inexperienced, having a medium amount stolen in a sensitive and stressful time of this person's life). I recognised fast and having time and will I sarted to play along, pretending I bite the bait. Collecting info while acting. In parallel trying to connect local and international authorities to report an ongoing scam effort. I believe I tried 4 organizations in 3 different countries apparently involved, I believe one was dedicated to online scams, also trying to warn Western Union, they are about to be used for scam. I even went personally to a police station locally to get some advice on how to assist catching the criminals. Since all I encountered insisted to report my damages, so they could start an investigation on an actual loss happened, I furiously gave up and decided whenever I will be having financial trouble I will invest my efforts in scamming others. No-one cares catching those in act! So the thugs can be incredibly bold and dumb, like the one I encountered, it is no effort doing better.

shoddydoordesk•1h ago
> it suddenly ballooned in size in April 2025 after its operators breached a TotoLink router firmware update server and infected approximately 100,000 devices

This is scary. Everyone lauds open source projects like OpenWRT but... who is watching their servers?

I imagine you can't run an army of security people on donations and a shoestring budget. Does OpenWRT use digital signing to mitigate this?

sam_lowry_•1h ago
This is exactly why OpenWRT has no unattended updates by default )
shoddydoordesk•1h ago
You are dismissing the seriousness of this. Their package manager is widely used. One would only need to compromise their build servers to wreak havoc.

Didn't they have a vulnerability in their firmware download tool like a minute ago?

The difference between OpenWRT and Linux distros is the amount of testing and visibility. OpenWRT is loaded on to residential devices and forgotten about, it doesn't have professional sysadmins babysitting it 24/7.

Remember the xz backdoor was only discovered because some autist at Microsoft noticed a microsecond difference in performance testing.

jacobgkau•1h ago
I'm confused why you're so honed in on OpenWRT as a third-party open-source project here when the vulnerability you quoted (TotoLink) was the official firmware update server of a brand of devices.

Is it "scary" to think about OpenWRT potentially getting hacked? If you get scared by theoretical possibilities in software, sure. Is it relevant? Not exactly. Are companies' official servers more secure than an open-source project's servers? In this case, apparently not.

whatshisface•1h ago
As always, hundreds watch the open repositories, maybe one watches a company's build servers, if they're lucky. :-)
TylerE•1h ago
Hundreds watch, but how closely?

Plenty of stories of fairly major projects having evil commits snuck in that remain for months.

immibis•1h ago
Digital signing wouldn't defend you from a compromised build server.
mbilker•1h ago
What in that act says OpenWrt would be made illegal? If anything, OpenWrt would roll out automated security updates for a supported branched release to comply with these regulations.

Also, if you actually read it, there are exceptions for open source software!

majorchord•36m ago
OP claims almost daily that some benign thing is actually illegal but practically never provides any useful proof when asked.

(please prove me wrong, Alex)

tempest_•1h ago
I don't follow.

> run an army of security people

Do you think these private companies do this? They don't. They pay as little as humanly possible to cover their ass.

Botnets comprised of compromised routers is common and commercial/consumer routers are a far juicer target than openwrt.

nine_k•1h ago
Why, OpenWRT firmware and packages are both signed, of course. You can manually and independently check the image signature before flashing an update.

The build infrastructure is, of course, a juicy target: infect the artifact after building but before signing, and pwn millions of boxes before this is detected.

This is why bit-perfect reproducible builds are so important. OpenWRT in particular have that: https://openwrt.org/docs/guide-developer/security#reproducib...

null_deref•1h ago
I don’t mean to cast any doubt, but are those short articles the standard, or why was there almost no data provided?
sva_•1h ago
I feel like posting the traffic output of the network might not be a great idea because they might do these attacks on purpose to market their network's capability.
kachapopopow•1h ago
it's an open secret at that point and the attacks are far larger than that are causing congestion world-wide from the time they wake up to the time they go to sleep.
Y_Y•1h ago
Cui bono?

There is a big (opportunity) cost to this kind of thing, How is this worthwhile for anyone? I assume that its's not just a competitor. Is it really worth <insert evil country>'s time to temporarily upset one of of three big cloud providers? Is there a ransom behind the scenes?

kachapopopow•1h ago
nope, there's really no cost to it - they've been hitting with attacks double or even triple the size towards random minecraft hosts for months now.
imglorp•1h ago
> it targeted a single endpoint in Australia.

It would really help to understand why attack one endpoint with "the largest DDoS attack ever observed in the cloud". If it was important, it would be redundant in its CDN. Who paid for this attack and what did they gain?

kachapopopow•1h ago
we were getting hit with attacks like this daily at some point and were forced to use cloudflare magic transit it's pretty random and you shouldn't read too deep into it as nearly every anti-ddos solution, host and isp has been hit with this botnet by now.
estearum•1h ago
but why? For fun?
kachapopopow•1h ago
yep, there's no consistency to their actions - basically hit a target and keep it down for as long as possible causing heavy business loss. to my knowledge none of the target servers have ever received a ransom request.
toast0•1h ago
I used to run servers for a very popular service. I'm 99% sure people DDoSed our www for lolz and also to kick the tires on DDoS as a service vendors. We would get DDoS on a pretty regular basis, for exactly 90 seconds, +/- a few nodes that had bad clock sync and were 2 seconds off; which was exactly what you get from a free trial at DDoS as a service. I feel like we got a ransom request like once; but I can't remember if it actually corresponded to an attack, if it did, I don't think it was consequential.

Thankfully, it was almost always targetted at our www servers, which were not important for our service. Very occasionally, we'd get hit on the machines that we actually ran our service on, but between the consistent DDoS on www, and our own self-inflicted DDoS from defects in the client code we wrote for our users, our service was well prepared... if the DDoS went over line rate for the server, our hosting provider would null route it [1], but otherwise, we could manage line rate of udp reflection or tcp syn floods and what have you. From what I could tell, most attackers didn't retarget to our other servers when one got null routed.

[1] They did try a DDoS scrubbing service, but having our servers behind the scrubber was way worse than just null routing. Maybe the scrubbing could have been tuned, but as it was, it was better for us to just have the attacked servers lose connectivity to the public network.

Razengan•1h ago
> self-inflicted defects

is what I'll call bugs from now

Razengan•1h ago
Maybe someone insulted an AI?
perfmode•1h ago
A DDoS attack is often used to distract a company's security team. While the security staff is scrambling to get the website back online, the attackers use the chaos to conduct a more serious, stealthy attack.
mihaaly•1h ago
It was interesting to read that the record breaking attack caused no glitch whatsoever in the service MS provides. Which is so slow normally that I start to wonder if that is a strategy, having headroom for these kind of situations, no-one realizes slowdown when it is already slow. ;)

This is just a crazy thought, tangential to what are happening during an attack.

averageRoyalty•33m ago
> This attack lasted only 40 seconds but was roughly equivalent to streaming one million 4K videos simultaneously.

Who is this for? Is there anyone reading the article that can't grasp what a terrabit is but can somehow conceptualise one million 4k videos streaming simultaneously? I don't think anyone sits in that venn diagram.